CN112953955A - Multi-party quantum Byzantine consensus optimization protocol - Google Patents

Multi-party quantum Byzantine consensus optimization protocol Download PDF

Info

Publication number
CN112953955A
CN112953955A CN202110237390.4A CN202110237390A CN112953955A CN 112953955 A CN112953955 A CN 112953955A CN 202110237390 A CN202110237390 A CN 202110237390A CN 112953955 A CN112953955 A CN 112953955A
Authority
CN
China
Prior art keywords
node
consensus
nodes
message
quantum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110237390.4A
Other languages
Chinese (zh)
Other versions
CN112953955B (en
Inventor
许娟
高欣欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Aeronautics and Astronautics
Original Assignee
Nanjing University of Aeronautics and Astronautics
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Aeronautics and Astronautics filed Critical Nanjing University of Aeronautics and Astronautics
Priority to CN202110237390.4A priority Critical patent/CN112953955B/en
Publication of CN112953955A publication Critical patent/CN112953955A/en
Application granted granted Critical
Publication of CN112953955B publication Critical patent/CN112953955B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N10/00Quantum computing, i.e. information processing based on quantum-mechanical phenomena
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Condensed Matter Physics & Semiconductors (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Evolutionary Computation (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computational Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Electromagnetism (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Multi Processors (AREA)

Abstract

The invention provides a multiparty quantum Byzantine consensus optimization protocol, which solves the problem of realizing distributed consensus under the condition of malicious nodes. The realization method comprises the following steps: 1) protocol parameters are initialized. 2) And designing a node integral mechanism and selecting a commander node. 3) And broadcasting the consensus message. 4) A triplet is formed. 5) A quantum tripartite byzantine consensus protocol is performed. 6) And updating the node integrals. 7) And circulating 2) to 6). 8) A consensus was reached. The invention improves the protocol fault tolerance by using a quantum method, and ensures that the tolerable malicious nodes are counted
Figure DSA0000235039620000011
Is lifted to
Figure DSA0000235039620000012
By multiple executionsThe protocol continuously optimizes the node parameters and reduces the malicious node points, so that the problem of randomness of selecting the commander nodes and the problem of communication resource waste caused by the fact that the malicious nodes are continuously selected as the commander nodes are solved.

Description

Multi-party quantum Byzantine consensus optimization protocol
Technical Field
The invention relates to the field of distributed consensus protocols and quantum computing, in particular to a multiparty quantum Byzantine consensus optimization protocol.
Background
The blockchain attracts a great deal of attention as a distributed system and an emerging technology for realizing a distributed ledger, and since the problem of the byzantine consensus has been an important research subject of the distributed system, the research on the byzantine consensus protocol can be applied to the field of blockchains. Among the various core components of the blockchain technology, consensus protocols are key to blockchain security and performance. The design of consensus protocols greatly affects the performance of blockchain systems, including transaction capability, scalability, and fault tolerance.
The practical Byzantine protocol pbft (practical Byzantine fault tolerance) is a common method for solving the mutual recognition of the Byzantine, but still has disadvantages, mainly embodied in that the number of malicious nodes which can be accommodated is small. Therefore, Fitzi et al pioneering a quantum solution for the simplest (three-party) Byzantine consensus BA (Byzantine agent) problem, and then the team designs a Detectable BA (DBA) protocol with unconditional safety to contain malicious nodes
Figure BSA0000235039650000011
Is improved to
Figure BSA0000235039650000012
And N is the total number of nodes. Later, on the basis of the research of the Fitzi team, research results related to the field are proposed one after another, and a more practical quantum Byzantine consensus protocol is designed.
The research result of the quantum Byzantine consensus protocol is rich, but the quantum Byzantine consensus protocol has defects. The protocol proposed by Fitzi et al is difficult to extend to the case of multiple nodes (N > 3), and the security of the whole protocol is threatened along with the increase of the number of nodes; the Lide Xue et al improves on the Fitzi-based protocol to be suitable for the multi-node consensus, but still has the following problems: 1) the selection of the commander nodes has the problem of randomness, and the maliciousness of the commander nodes is not pre-judged, so that the malicious nodes are probably selected at a high probability to block the consensus process; 2) if the malicious nodes are continuously selected as the commander nodes, the communication cost is greatly increased in consideration of the communication traffic needing to be exchanged in the multi-round consensus process.
Disclosure of Invention
The invention designs a multiparty quantum Byzantine consensus optimization protocol. For solving the following problems: 1) the upper limit of the number of the malicious nodes which can be accommodated in the Byzantine consensus protocol is improved; 2) the problem of randomly selecting a commander node in a quantum Byzantine consensus protocol is solved; 3) the problem of increased communication traffic caused by malicious nodes being elected as commander nodes continuously is solved. In order to improve the upper limit of the number of the receivable malicious nodes, the invention introduces a three-party quantum Byzantine consensus protocol for completing a consensus process; in order to solve the problem of randomness of selection of the commander nodes, an integral mechanism is introduced, the integral mechanism relates to the operation of adding and subtracting the nodes, and the design of the integral mechanism can reduce the possibility that malicious nodes are selected as the commander nodes and solve the problem of increased communication traffic.
The invention provides a multiparty quantum Byzantine consensus optimization protocol, which comprises the following specific contents:
step 1: initializing each node NiA parameter;
step 2: selecting a commander node according to the node integral and marking as NcPreparing for subsequent consensus;
and step 3: n is a radical ofcBroadcasting the consensus information to all the nodes;
and 4, step 4: selecting cooperative nodes based on node integrals to form multiple triple combinations (N)c,Ns,Nsi);
And 5: (N)c,Ns,Nsi) Executing a three-party quantum Byzantine consensus protocol, comprising the following processes:
(1)Nc,Ns,Nsithree parties share a group of quantum entangled states, and the correlation of the measurement results of the group of quantum entangled states is used as pre-sharing information;
(2)Ncwill agree with the message mcAnd pre-shared information is sent to N respectivelysAnd Nsi
(3)NsiThe consensus message m received by the user is transmittedcAnd pre-shared information to Ns
(4)NsBy comparing own local information with information obtained from the process (3), for NcAnd NsiJudging the integrity of the node;
(5) if N is presentsDiscovery of NcIs a dishonest or malicious node, NsWill voluntarily broadcast a report message to all nodes in the format of<(Nc,Ns),s>S is NsThe meaning of the report message is NcThe node is a dishonest or malicious node and updates its own "isolated" set, i.e. Is=Is∪{Nc,Ns};
(6) If N is presentsDiscovery of NsiIs a dishonest or malicious node, NsWill give up with NsiExecuting three-party quantum Byzantine consensus protocol and no longer keeping with N in time period tsiAnd (4) cooperation.
Step 6: node NiReceiving the publish message, for NcNode Subtraction and Pair NsNode bonus and update 'isolated' set Ii
And 7: step 1 to step 6 are circulated when N isiWhen no report message is received, go to step 8;
and 8: obtaining a final consensus message, comprising the following processes:
(1) if N is presentiNot in the isolated set, broadcasting the consensus message to all nodes in the isolated set;
(2) if N is presentiIn the 'isolated' set, the message set M of the self is countediThe number of messages (from consensus messages outside the "isolated" set), the largest number of messages being the final consensus message.
Step 1, initializing NiThe node parameters include the following:
(1) "isolated" set IiThe method comprises the steps that { }, an isolation set is used for storing a commander node N of each round in a protocol execution processcAnd node N broadcasting report messagess
(2)NiNodal integral si
(3) Counter ri=0,riRepresenting the number of times of changing the commander node before the final consensus message is obtained;
(4) message set MiThe device comprises a message receiving module, a message sending module and a message sending module, wherein the message receiving module is used for receiving messages in a common identification process;
step 2, selecting the commander node comprises the following processes:
(1) randomly selecting a node as an alternative commander node, and marking as Nc', and Nc' not belonging to the "isolated" set;
(2) each node NiReceive Nc' node information, NiNode N to be locally storedc'node's integral is compared with a preset threshold, above which N is agreedc' as commander node, and sends self-signed acknowledgement message to Nc' node; if the integral is below the threshold, NiNo information is sent;
(3)Nc' node counts the number of received acknowledgement messages, if the number reaches 2t, then Nc' can be used as the command node of the wheel and is marked as Nc(ii) a If not, turning to the step 1;
step 3, the broadcasting of the consensus message comprises the following processes:
(1)Ncthe format of the broadcast message is:<consensus message, 2t signature confirmation messages>Broadcasting to all nodes;
(2) the node verifies the 2t signatures and receives the consensus information;
step 4, the selecting of the cooperative node comprises the following processes:
(1) if N is presentsNode "isolation" set IsThe number of nodes other than the node is more than 3, NsRemoving nodes which do not cooperate any more in the time period t in the step 5 by the nodes, otherwise, turning to the step 6;
(2)Niwill NcAnd NsJoin its own "isolated" set, i.e. Ii=Ii∪{Nc,Ns};NiReceive information about NcCounting the number of the messages and recording as x;
(3) randomly selecting m nodes from the nodes higher than the threshold value as cooperative nodes;
step 6, the pair of NcNode deduction, comprising the following processes:
(1)Niwill NcAnd NsJoin its own "isolated" set, i.e. Ii=Ii∪{Nc,Ns};
(2)NiReceive information about NcCounting the number of the messages and recording as x;
(3)Niaccording to the formula
Figure BSA0000235039650000021
To NcThe nodes are subjected to division reduction;
(4) updating locally saved NcIntegral of (1);
step 6, the pair of NsNode adding, comprising the following processes:
(1) will NcAnd NsJoin its own "isolated" set, i.e. Ii=Ii∪{Nc,Ns}
(2)NiReceive information about NcIn the form of a plurality of published messages<(Nc,Ns),ss>;
(3)NiVerification of NsAfter verification, for NsAdding 1 to the score of the node;
(4) updating locally saved NsIntegral of (1);
(5) update riA value of (i), i.e. ri=ri+1。
Different from the existing treatment method, the invention has the beneficial effects that: information sharing among nodes is realized by utilizing quantum entanglement state, and the upper limit of the number of the contained malicious nodes is further increased
Figure BSA0000235039650000031
Is increased to
Figure BSA0000235039650000032
In the existing quantum byzantine consensus protocol,the selection mode of the commander node is too random, integrity and correctness of the commander node cannot be guaranteed, once malicious nodes are continuously selected as the commander node, the consensus process is hindered, a large amount of waste of system resources can be caused, and communication overhead is increased; according to the point mechanism designed by the invention, the nodes divide down the malicious commander nodes in proportion according to the number of the received report messages, and meanwhile, the condition that the malicious nodes intentionally broadcast the report messages and corrupt the honest commander nodes is fully considered, so that even if the honest nodes are changed into the malicious nodes by the slight voice, the points can be quickly increased through point adding operation, the commander nodes participating in the next round of consensus process are selected, and in addition, the points are stimulated to actively broadcast the malicious node identities through point adding operation, and the malicious node behaviors are limited.
Drawings
FIG. 1 is a flow chart of protocol execution of the present invention;
FIG. 2 is a diagram illustrating an exemplary implementation of a protocol according to the present invention;
FIG. 3 is a flow chart of the commander node selection of the present invention;
FIG. 4 is a flow chart of the operation of the present invention for the subtraction.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and are used for illustration only, and should not be construed as limiting the patent. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The present invention will be further described in detail with reference to the accompanying drawings, wherein the overall flow chart of the present invention is shown in fig. 1, and the specific implementation schematic diagram of the present invention is shown in fig. 2.
Step 1: and initializing parameters. si=100,Ii={},ri=0,Mi={},i∈{0,1,2,3,4,5},N0Is a malicious node;
step 2:selecting a commander node according to the node integral and marking as Nc
As shown in FIG. 3, the system randomly generates an Id number as an alternative commander node Nc', then broadcasts the node's identity to the full network node Ni,NiAfter receiving broadcast information, inquiring locally stored Nc' integrate and compare at a predetermined threshold, above which N is agreedc' become a commander node and send a confirmation message with a signature to Nc' node, if below threshold, do nothing; n is a radical ofc' node is selected as commander node N after receiving 2t confirmation messagesc. In this example, N0Is selected as the commander node.
And step 3: n is a radical of0Broadcast consensus message m0Giving the nodes of the whole network;
and 4, step 4: n is a radical ofiThe nodes select cooperative nodes according to local node integrals, and a plurality of triple combinations (N) are formed by combining specific examples, as shown in step 4 of FIG. 20,N1,N2),(N0,N1,N3),(N0,N2,N4),(N0,N3,N5)....;
And 5: the triple in the step 4 executes a three-party quantum Byzantine consensus protocol;
as shown in step 5 of fig. 2: n is a radical of1Discovery of N0Dishonest or malicious nodes, N1Will voluntarily broadcast a report message to all nodes in the format of<(N0,N1),s1>,s1Is N1The meaning of the message is N0The node is a malicious node and updates its own "isolated" set, i.e., I1=I1∪{N0,N1}。
Step 6: node N2~N5Receiving the publish message, for N0Node Subtraction and Pair N1Node bonus and update 'isolated' set I2~I5
With N in conjunction with FIG. 42For example, the division operation is illustrated, and comprises the following processes:
(1)N2will N0And N1Join its own "isolated" set, i.e. I2=I2∪{N0,N1};
(2)N2Statistics received about N0The number of the plurality of published messages is recorded as x;
(3)N2according to the formula
Figure BSA0000235039650000041
To N0The nodes are subjected to division reduction;
(4) updating locally saved N0Is calculated.
With N2For example, the adding and dividing operation is illustrated, and comprises the following processes;
(1)N2will N0And N1Join its own "isolated" set, i.e. I2=I2∪{N0,N1};
(2)N2Receive information about N0In the form of a plurality of published messages<(N0,N1),s1>;
(3)N2Verification of N1After verification, for N1Adding 1 to the score of the node;
(4) updating locally saved N1Is calculated.
And 7: circulating the step 1 to the step 6; until no more report messages are received;
and 8: with N5For example, when N is5When no report message is received any more, the following operations are executed:
(1) if N is present5Not in the "isolated" set, will agree on the message m5Broadcast to all nodes in the "isolated" set;
(2) if N is present5In the 'isolated' set, the message set M of the self is counted5The number of messages in (consensus messages broadcast from nodes outside the "isolated" set), the message with the largest number of messages being the final consensusAnd (5) identifying the message.

Claims (7)

1. A multiparty quantum Byzantine consensus optimization protocol, comprising the steps of:
the method comprises the following steps: initializing each node NiThe parameters of (1);
step two: selecting a commander node according to the node integral and marking as NcPreparing for subsequent consensus;
step three: n is a radical ofcBroadcast consensus message mcGiving all the nodes;
step four: the other nodes select cooperative nodes according to the node integrals to form a plurality of triple combinations (N)c,Ns,Nsi);
Step five: (N)c,Ns,Nsi) Executing a three-party quantum Byzantine consensus protocol, comprising the following processes:
(1)Nc,Ns,Nsithree parties share a group of quantum entangled states, and the correlation of the measurement results of the group of quantum entangled states is used as pre-sharing information;
(2)Ncwill agree with the message mcAnd pre-shared information is sent to N respectivelysAnd Nsi
(3)NsiThe consensus message m received by the user is transmittedcAnd pre-shared information to Ns
(4)NsBy comparing own local information with information obtained from the process (3), for NcAnd NsiJudging the integrity of the node;
(5) if N is presentsDiscovery of NcIs a malicious node, NsWill voluntarily broadcast a report message to all nodes in the format of<(Nc,Ns),s>S is NsThe meaning of the report message is NcThe node is a malicious node and updates its own "isolated" set, i.e., Is=Is∪{Nc,Ns};
(6) If N is presentsDiscovery of NsiIs a malicious node, NsWill give up with NsiExecuting three-party quantum Byzantine consensus protocol and no longer keeping with N in time period tsiAnd (4) cooperation.
Step six: node NiReceiving and counting report messages, for NcNode Subtraction and Pair NsNode bonus and update 'isolated' set Ii
Step seven: step one to step six are circulated, when N isiWhen no report message is received, turning to step eight;
step eight: obtaining a final consensus message, comprising the following processes:
(1) if Ni is not in the isolated set, broadcasting the consensus message to all nodes in the isolated set;
(2) if N is presentiIn the 'isolated' set, the message set M of the self is countediThe number of messages (from consensus messages outside the "isolated" set), the largest number of messages being the final consensus message.
2. The multiparty quantum byzastidine consensus optimization protocol of claim 1, wherein N is defined in step oneiThe node parameter initialization comprises the following parts:
(1) "isolated" set IiThe "isolated" set is used to store the node N that the protocol performs the broadcast report message in each round of consensussAnd the reported commander node Nc
(2)NiNodal integral si
(3) Counter ri=0,riRepresenting the number of change rounds of the commander node before the final consensus is obtained;
(4) message set MiAnd the message is used for storing the message received in the consensus process.
3. The multiparty quantum byzantine consensus optimization protocol according to claim 1, wherein the selection of the commander node in the second step comprises the following steps:
s1: randomly choose oneThe node is used as an alternative commander node and is marked as Nc', and Nc' not belonging to the "isolated" set;
s2: each node NiReceive Nc' node information, NiNode N to be locally storedc'node's integral is compared with a preset threshold, above which N is agreedc' as commander node, and sends self-signed acknowledgement message to Nc' node; if the integral is below the threshold, NiNo information is sent;
S3:Nc' node counts the number of received acknowledgement messages, if the number reaches 2t, then Nc' can be used as the command node of the wheel and is marked as Nc(ii) a And if the time does not reach 2t, turning to the step one.
4. The multiparty quantum byzastine consensus optimization protocol of claim 1, wherein the step of broadcasting the consensus message in step three comprises the steps of:
S1:Ncthe format of the broadcast message is:<consensus message mc2t signature confirmation messages>Broadcasting to all nodes;
s2: and the node verifies the 2t signatures and receives the consensus information.
5. The multiparty quantum byzantine consensus optimization protocol according to claim 1, wherein said selection of cooperative nodes in step four comprises the steps of:
s1: if N is presentsNode "isolation" set IiThe number of nodes other than the node is more than 3, NsRemoving the nodes which are no longer cooperative in the time period t in the step five of the claim 1, otherwise, turning to the step eight in the claim 1;
s2: after multiple rounds of consensus, NsThe node holds the integral state of all nodes, NsScreening out nodes higher than a threshold value by the nodes;
s3: and randomly selecting k nodes from the nodes higher than the threshold value as cooperative nodes.
6. The multiparty quantum byzastidine consensus optimization protocol of claim 1, wherein in step six, N is selectedcThe node deduction method comprises the following steps:
S1:Niwill NcAnd NsJoin its own "isolated" set, i.e. Ii=Ii∪{Nc,Ns};
S2:NiReceive information about NcThe number of the statistical messages is recorded as x;
S3:Niaccording to the formula
Figure FSA0000235039640000021
To NcThe nodes are subjected to division reduction;
s4: updating locally saved NcIs calculated.
7. The multiparty quantum byzastidine consensus optimization protocol of claim 1, wherein in step six, N is selectedsThe node scoring comprises the following steps:
s1: will NcAnd NsJoin its own "isolated" set, i.e. Ii=Ii∪{Nc,Ns};
S2:NiReceive information about NcIn the form of a plurality of published messages<(Nc,Ns),ss>;
S3:NiVerification of NsAfter verification, for NsAdding 1 to the score of the node;
s4: updating locally saved NsIntegral of (1);
s5: update riA value of (i), i.e. ri=ri+1。
CN202110237390.4A 2021-03-03 2021-03-03 Multi-party quantum Byzantine consensus optimization protocol Active CN112953955B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110237390.4A CN112953955B (en) 2021-03-03 2021-03-03 Multi-party quantum Byzantine consensus optimization protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110237390.4A CN112953955B (en) 2021-03-03 2021-03-03 Multi-party quantum Byzantine consensus optimization protocol

Publications (2)

Publication Number Publication Date
CN112953955A true CN112953955A (en) 2021-06-11
CN112953955B CN112953955B (en) 2023-04-07

Family

ID=76247519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110237390.4A Active CN112953955B (en) 2021-03-03 2021-03-03 Multi-party quantum Byzantine consensus optimization protocol

Country Status (1)

Country Link
CN (1) CN112953955B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113542285A (en) * 2021-07-19 2021-10-22 东南大学 Multi-stage automatic formal verification method for Terdermint consensus protocol
CN113660272A (en) * 2021-08-18 2021-11-16 北京航空航天大学 Asynchronous consensus method and device for anti-Byzantine sequencing
CN114553423A (en) * 2022-04-27 2022-05-27 南京大学 Decentralized quantum Byzantine consensus method
CN115118420A (en) * 2022-08-26 2022-09-27 中国科学技术大学 Communication method based on quantum detectable weak Byzantine protocol

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833353A (en) * 2018-05-18 2018-11-16 中南大学 The quantum Byzantium Agreement Methods participated in based on tripartite
CN110602077A (en) * 2019-09-03 2019-12-20 成都信息工程大学 Quantum block chain network anonymous election method and system based on trust evaluation
CN111865968A (en) * 2020-07-16 2020-10-30 南京工业大学 Optimized Byzantine fault-tolerant algorithm applied to block chain
CN111970130A (en) * 2020-10-21 2020-11-20 深圳职业技术学院 Quantum block chain establishment method and system
CN111970111A (en) * 2020-10-22 2020-11-20 深圳职业技术学院 Quantum zero knowledge proof-based block chain consensus mechanism establishing method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833353A (en) * 2018-05-18 2018-11-16 中南大学 The quantum Byzantium Agreement Methods participated in based on tripartite
CN110602077A (en) * 2019-09-03 2019-12-20 成都信息工程大学 Quantum block chain network anonymous election method and system based on trust evaluation
CN111865968A (en) * 2020-07-16 2020-10-30 南京工业大学 Optimized Byzantine fault-tolerant algorithm applied to block chain
CN111970130A (en) * 2020-10-21 2020-11-20 深圳职业技术学院 Quantum block chain establishment method and system
CN111970111A (en) * 2020-10-22 2020-11-20 深圳职业技术学院 Quantum zero knowledge proof-based block chain consensus mechanism establishing method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
武霞 等: "量子拜占庭协议中的纠缠态探测", 《网络与信息安全学报》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113542285A (en) * 2021-07-19 2021-10-22 东南大学 Multi-stage automatic formal verification method for Terdermint consensus protocol
CN113542285B (en) * 2021-07-19 2022-06-28 东南大学 Multi-stage automatic formal verification method for Terdermint consensus protocol
CN113660272A (en) * 2021-08-18 2021-11-16 北京航空航天大学 Asynchronous consensus method and device for anti-Byzantine sequencing
CN113660272B (en) * 2021-08-18 2022-06-21 北京航空航天大学 Asynchronous consensus method and device for anti-Byzantine sequencing
CN114553423A (en) * 2022-04-27 2022-05-27 南京大学 Decentralized quantum Byzantine consensus method
CN115118420A (en) * 2022-08-26 2022-09-27 中国科学技术大学 Communication method based on quantum detectable weak Byzantine protocol

Also Published As

Publication number Publication date
CN112953955B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN112953955B (en) Multi-party quantum Byzantine consensus optimization protocol
Luo et al. A new election algorithm for DPos consensus mechanism in blockchain
Hanke et al. Dfinity technology overview series, consensus system
CN111371877B (en) Consensus method of heterogeneous alliance chain
US20200366495A1 (en) Proof of majority block consensus method for generating and uploading a block to a blockchain
CN112039964A (en) Node reputation consensus method based on block chain
CN111355810A (en) Improved PBFT consensus method based on credit and voting mechanism
CN106682984A (en) Block chain-based transaction business processing method and system
CN112104482B (en) Consensus method based on parallel voting
Dutta et al. Constant round dynamic group key agreement
CN111182510B (en) Industrial Internet of things node consensus method based on block chain
CN113570357B (en) Dynamic layered efficient PBFT algorithm
Wang et al. Randchain: Practical scalable decentralized randomness attested by blockchain
CN112887380A (en) Cross-chain intercommunication method and system
CN112217683A (en) Cross-heterogeneous-chain data reachability processing method, system, medium, device and terminal
CN113781218A (en) Grouping PBFT consensus algorithm based on feature trust
CN111798234B (en) Lightweight block chain system and construction method
CN114881648A (en) Block chain interconnection method and equipment based on prediction machine and oriented to cross-chain asset replacement scene
CN114615281B (en) Block chaining and block outputting method based on small-scale committee and PoS protocol confirmation method
Niu et al. On the performance of pipelined hotstuff
D'Amato et al. Goldfish: No More Attacks on Proof-of-Stake Ethereum
CN113807851B (en) Block chain expandability realization method and system based on slicing
CN115378788B (en) Block chain performance self-adaptive optimization method based on hierarchical consensus and reinforcement learning
Zhang et al. Broadcasting intermediate blocks as a defense mechanism against selfish-mine in bitcoin
CN113746859B (en) High-network-performance and high-security VaPBFT block chain consensus method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant